Home Edward J. Hawkins, II

Edward J. Hawkins, II

Business Continuity Planning Keeps IT Running Securely

When we consider the devastation that can result to an organization from any number of threats and threat actors, it is prudent to have a plan in place to keep that organization running, even if not at full capacity. This type of documentation is referred to as a business continuity plan (BCP).

Security Fundamentals: Ethics in Cybersecurity

For most organizations, those professionals that work in support roles are typically the most trusted within the organization due to the nature of their work.

Designing a Secure Physical Environment for Your Network

The relatively short history of information technology (IT) and the lack of its secure implementation require that many new technologies be designed, implemented and installed in existing infrastructures.

Using the Layered Approach to Cybersecurity Protection

Using the layered approach to organizational cybersecurity has grown in importance, with security issues resulting from BYOD policies and IoT devices.

Security Fundamentals: Maintaining Network Availability

Availability is probably one of the more convoluted security goals in the CIA Triad. This is due to its position in terms of security.